Debian Security Advisory
DSA-2984-1 acpi-support -- security update
- Date Reported:
- 22 Jul 2014
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2014-1419.
- More information:
CESG discovered a root escalation flaw in the acpi-support package. An unprivileged user can inject the DBUS_SESSION_BUS_ADDRESS environment variable to run arbitrary commands as root user via the policy-funcs script.
For the stable distribution (wheezy), this problem has been fixed in version 0.140-5+deb7u1.
For the testing distribution (jessie), this problem has been fixed in version 0.142-2.
For the unstable distribution (sid), this problem has been fixed in version 0.142-2.
We recommend that you upgrade your acpi-support packages.